Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless intrusion detection and device fingerprinting through preamble manipulation

a technology of preamble manipulation and intrusion detection, applied in the field of wireless networks, can solve the problems of spoofing and route poisoning attacks on wireless networks, and achieve the effect of energy efficient and invarian

Active Publication Date: 2018-10-23
THE UNITED STATES OF AMERICA AS REPRESETNED BY THE SEC OF THE AIR FORCE
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012]Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Embodiments of the invention demonstrate a novel and complementary approach to exploiting physical layer differences among wireless devices that is more energy efficient and invariant with respect to the environment. Specifically, the embodiments exploit subtle design differences among transceiver hardware types. Transceivers fulfill the physical layer aspects of wireless networking protocols, yet specific hardware implementations vary among manufacturers and device types. Precise manipulation of the physical layer preamble may assist in preventing a subset of transceiver types from receiving the modified packet. By soliciting acknowledgments from wireless devices using a small number of packets with modified preambles, a response pattern identifies the true transceiver class of the device under test. Herein the embodiments demonstrate a transceiver taxonomy of eight manufacturers into seven classes with greater than 99% accuracy, irrespective of environment. Wireless multi-factor authentication, intrusion detection, and transceiver type fingerprinting through preamble manipulation is successfully demonstrated.

Problems solved by technology

Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless intrusion detection and device fingerprinting through preamble manipulation
  • Wireless intrusion detection and device fingerprinting through preamble manipulation
  • Wireless intrusion detection and device fingerprinting through preamble manipulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]Wireless Personal Area Networks (WPAN) fulfill critical functions in healthcare, automation, and smart energy systems. However, WPAN devices are challenging to secure due to tight design constraints on cost, computing resources, and energy use. WPAN devices implement physical layer (PHY) features of the IEEE 802.15.4 standard in their transceiver hardware. While software tools such as KillerBee can generate arbitrary message payloads, low level specifications such as frame synchronization and the wireless preamble are immutable from software. The only alterable physical layer parameter on a WPAN device is the operating RF channel.

[0035]Device authentication is a fundamental process in communication networks. Ostensibly immutable hardware addresses (e.g., MAC addresses) often serve as the lowest level “true” hardware identity. However, MAC address spoofing is straightforward with open source tools such as macchanger for IEEE 802.11 and zbassocflood for IEEE 802.15.4. Cryptograp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of establishing a hardware identity of a coordinating device in a wireless network is provided. A standard PHY preamble is modified to a preamble that can be received by the coordinating device having an expected hardware configuration. The modified PHY preamble is transmitted with an association request by a joining device. In response to not receiving a reply containing an association response from the coordinating device by the joining device, determining the hardware configuration of the coordinating device is not the expected hardware configuration. A further method of characterizing a hardware identity of a device in a wireless network is also provided. A request with a modified PHY preamble is transmitted to a device. If a reply is received from the device, characterizing the device as a first hardware type. And, if a reply is not received, characterizing the device as not the first hardware type.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims the benefit of and priority to U.S. Provisional Application Ser. No. 62 / 055,362, entitled “Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation,” filed on Sep. 25, 2014, the entirety of which is incorporated by reference herein.RIGHTS OF THE GOVERNMENT[0002]The invention described herein may be manufactured and used by or for the Government of the United States for all governmental purposes without the payment of any royalty.BACKGROUND OF THE INVENTION[0003]Field of the Invention[0004]The present invention generally relates to wireless networks and, more particularly, to wireless intrusion detection.[0005]Description of the Related Art[0006]Low-rate Wireless Personal Area Networks (WPANs) enable energy-efficient connectivity among large numbers of devices. The IEEE 802.15.4 specification is an industry standard for low-power, low-rate, WPANs. Low implementation costs associated with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04W12/06H04W84/18H04W12/12H04W4/80
CPCH04W12/06H04W12/12H04W84/18H04W4/80H04W12/122H04W12/79
Inventor RAMSEY, BENJAMIN WMULLINS, BARRY E
Owner THE UNITED STATES OF AMERICA AS REPRESETNED BY THE SEC OF THE AIR FORCE